Browser applications for the purpose of data security and surfing privacy allow the blockage of tracking measures and data collection regarding the user activity on the Internet. This article analyses the function of four common data security and privacy applications in the internet: Privacy Badger; Disconnect; Ghostery; and Privdog. The content analysis includes three aspects: functional activity, user interface design and economic-financial sources. The results show that in spite of the functional similarity between the applications, each application has its own unique approach for maintaining privacy and each acts in a different way and on different levels to secure the user data on the internet
The price of Internet services is user information, and many pay it without hesitation. While myriad...
The web has improved our life and has provided us with more opportunities to access information and ...
The modern Internet employs a vast number of different methods in order to track the user across sit...
Abstract: The internet was meant to shorten the distance between the people to ground breaking level...
There are multiple issues in the privacy notices and choices of ubiquitous mobile apps and online se...
The presence of web tracking technology has grown to a near-ubiquitous state as web pages contain a ...
World Wide Web and the graphic user agents(web browsers) have brought the internet to billions of ne...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Today the Internet has revolutionized it into a cyberspace, mainly due to its attributes of convenie...
As the wealth of quality application services grows, so too does the volume of data that users disc...
The Internet has revolutionized the way the world and everything around works. People today find it ...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
The Internet and the web are ingrained in our society, and billions of people are on it daily. The n...
Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and mali...
The price of Internet services is user information, and many pay it without hesitation. While myriad...
The price of Internet services is user information, and many pay it without hesitation. While myriad...
The web has improved our life and has provided us with more opportunities to access information and ...
The modern Internet employs a vast number of different methods in order to track the user across sit...
Abstract: The internet was meant to shorten the distance between the people to ground breaking level...
There are multiple issues in the privacy notices and choices of ubiquitous mobile apps and online se...
The presence of web tracking technology has grown to a near-ubiquitous state as web pages contain a ...
World Wide Web and the graphic user agents(web browsers) have brought the internet to billions of ne...
The collection of personal data in cyberspace is an invasion of personal privacy. Data collection te...
Today the Internet has revolutionized it into a cyberspace, mainly due to its attributes of convenie...
As the wealth of quality application services grows, so too does the volume of data that users disc...
The Internet has revolutionized the way the world and everything around works. People today find it ...
Protecting privacy on the Web is becoming increasingly complicated because of the considerable amoun...
The Internet and the web are ingrained in our society, and billions of people are on it daily. The n...
Millions of users employ secure and privacy preserving systems to prevent privacy-intrusive and mali...
The price of Internet services is user information, and many pay it without hesitation. While myriad...
The price of Internet services is user information, and many pay it without hesitation. While myriad...
The web has improved our life and has provided us with more opportunities to access information and ...
The modern Internet employs a vast number of different methods in order to track the user across sit...